CVE-2026-6177: XSS in Custom Twitter Feeds WordPress Plugin
Plateforme
wordpress
Composant
custom-twitter-feeds
Corrigé dans
2.5.5
CVE-2026-6177 is a stored Cross-Site Scripting (XSS) vulnerability discovered in the Custom Twitter Feeds plugin for WordPress. This flaw allows unauthenticated attackers to inject malicious scripts into cached tweet data, which are then executed when other users view the affected tweets. The vulnerability impacts versions 1.0.0 through 2.5.4 and has been resolved in version 2.5.5.
Détecte cette CVE dans ton projet
Téléverse ton fichier de dépendances et découvre instantanément si cette CVE et d'autres te touchent.
Impact et Scénarios d'Attaquetraduction en cours…
An attacker exploiting this XSS vulnerability can execute arbitrary JavaScript code in the context of a victim's browser. This can lead to various malicious outcomes, including session hijacking, defacement of the WordPress site, redirection to phishing pages, and theft of sensitive user data. The ctfgetmore_posts AJAX action, accessible to unauthenticated users, directly outputs cached tweet data without proper HTML escaping, making it a prime target for injection. The attacker's ability to inject malicious content hinges on their ability to influence the cached tweet data, either through crafted tweets or exploiting other vulnerabilities within the plugin or WordPress itself. This vulnerability shares similarities with other XSS flaws where insufficient output encoding allows for the execution of attacker-controlled scripts.
Contexte d'Exploitationtraduction en cours…
CVE-2026-6177 was published on 2026-05-13. Its severity is rated HIGH with a CVSS score of 7.2. There is no indication of this vulnerability being on KEV or having an EPSS score at this time. Public proof-of-concept (POC) code is not yet publicly available, but the vulnerability's nature makes it likely that such code will emerge. Monitor security advisories and exploit databases for updates.
Renseignement sur les Menaces
Statut de l'Exploit
CISA SSVC
Vecteur CVSS
Que signifient ces métriques?
- Attack Vector
- Réseau — exploitable à distance via internet. Aucun accès physique ou local requis.
- Attack Complexity
- Faible — aucune condition spéciale requise. Exploitable de manière fiable.
- Privileges Required
- Aucun — sans authentification. Aucune identifiant requis pour exploiter.
- User Interaction
- Aucune — attaque automatique et silencieuse. La victime ne fait rien.
- Scope
- Modifié — l'attaque peut pivoter au-delà du composant vulnérable.
- Confidentiality
- Faible — accès partiel ou indirect à certaines données.
- Integrity
- Faible — l'attaquant peut modifier certaines données avec un impact limité.
- Availability
- Aucun — aucun impact sur la disponibilité.
Logiciel Affecté
Classification de Faiblesse (CWE)
Chronologie
- Réservé
- Publiée
Mitigation et Contournementstraduction en cours…
The primary mitigation for CVE-2026-6177 is to immediately upgrade the Custom Twitter Feeds plugin to version 2.5.5 or later. If upgrading is not immediately feasible, consider implementing a Web Application Firewall (WAF) rule to filter potentially malicious input in the ctfgetmore_posts AJAX action. Specifically, look for patterns indicative of JavaScript code within the tweet content. As a temporary workaround, disabling the caching of tweets within the plugin might reduce the attack surface, but this will likely impact performance. After upgrading, confirm the fix by attempting to inject a simple JavaScript payload (e.g., <script>alert('XSS')</script>) into a tweet and verifying that it is not executed.
Comment corriger
Mettre à jour vers la version 2.5.5, ou une version corrigée plus récente
Questions fréquentestraduction en cours…
What is CVE-2026-6177 — XSS in Custom Twitter Feeds WordPress Plugin?
CVE-2026-6177 is a stored Cross-Site Scripting (XSS) vulnerability affecting the Custom Twitter Feeds plugin for WordPress versions 1.0.0 through 2.5.4. It allows attackers to inject malicious scripts into cached tweet data.
Am I affected by CVE-2026-6177 in Custom Twitter Feeds WordPress Plugin?
You are affected if you are using the Custom Twitter Feeds plugin for WordPress in versions 1.0.0 to 2.5.4. Upgrade to 2.5.5 or later to mitigate the risk.
How do I fix CVE-2026-6177 in Custom Twitter Feeds WordPress Plugin?
The recommended fix is to upgrade the Custom Twitter Feeds plugin to version 2.5.5 or later. As a temporary workaround, consider a WAF rule or disabling tweet caching.
Is CVE-2026-6177 being actively exploited?
While there is no confirmed active exploitation at this time, the vulnerability's nature makes it a likely target. Monitor security advisories and exploit databases for updates.
Where can I find the official Custom Twitter Feeds advisory for CVE-2026-6177?
Refer to the plugin developer's website or WordPress plugin repository for the latest advisory and update information regarding CVE-2026-6177.
Ton projet est-il affecté ?
Téléverse ton fichier de dépendances et découvre instantanément si cette CVE et d'autres te touchent.
Détecte cette CVE dans ton projet
Téléverse ton fichier de dépendances et découvre instantanément si cette CVE et d'autres te touchent.
Scannez votre projet WordPress maintenant — sans compte
scanZone.subtitle
Glissez-déposez votre fichier de dépendances
composer.lock, package-lock.json, requirements.txt, Gemfile.lock, pubspec.lock, Dockerfile...